منابع مشابه
Barriers of knowledge flow in libraries of Islamic Azad universities compared to libraries of State universities
Background and Purpose: Knowledge management is a process that helps organizations in identify, select, organize, publication and transfer unstructured information and skills. Today, this experience has failed in some organizations about knowledge management. Academic libraries are also subject to similar conditions as an organization. Therefore, the purpose of this study is to identify and com...
متن کاملThreats to Digitization: Computer Virus
Discusses historical background of Internet and pointed out how threats to digitization has increased with the development of Internet. The paper mentioned common symptoms of virus infection and suggests some measures towards protecting computers from virus as recommended by Microsoft and Symantec Corporation. Also lists some authorized anti-virus software available on Internet.
متن کاملNeural Responses to Sanction Threats
Sanctions are used ubiquitously to enforce obedience to social norms. Recent field studies and laboratory experiments have demonstrated, however, that cooperation is sometimes reduced when incentives meant to promote pro-social decisions are added to the environment. Although a variety of explanations have been suggested, the neural foundations of this effect have not been fully explored. Using...
متن کاملVirus Threats to Monk Seals
There were no suitable rehabilitation facilities in Greece at that time, and so the policy was still to bring monk seals to the Netherlands for treatment. That's basically against our rules today. The 1988 morbillivirus outbreak in the North Sea underlined the increased risks involved in moving animals in this way. As a result, it was decided that we should offer training and technical expertis...
متن کاملThreats to TCP/IP Security
Because of this increased focus on network security, network administrators often spend more effort protecting their networks than on actual network setup and administration. New tools that probe for system vulnerabilities, such as IIS (Internet Security Scanner) assist in these efforts, but these tools only point out areas of weakness instead of providing a means to protect networks. Thus, as ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Przegląd Biblioteczny
سال: 2020
ISSN: 2545-2487,0033-202X
DOI: 10.36702/pb.769